For some time now, threat hunters have talked about knowing the unknowns. It’s time to expand that to the entire spectrum of cybersecurity: to users, apps, data, and clouds. You can’t protect what you can’t see.
You generally want to support the business, and not mire it down in bureaucracy. If you’re going to be a bit more open, how are you mitigating control? This is going to be different for everyone. CISOs must deal with that balance of organizational culture while combatting the most critical threats. Sometimes blocking everything and locking everything down doesn’t fit the culture of the enterprise. That might be right for a bank but not for a university.
The CISO faces several challenges managing cyberrisk – whatever their organizational model:
IT is usually siloed across the organization, making integration of securing the network, the cloud, and employee endpoints highly complex.
“You strive to understand how to get visibility into unknowns such as the new threats that are coming in – or even from within your own environment: unknown devices, apps, data. If you can’t see it, you can’t protect it. That’s the biggest thing that keeps me up at night."
Additional technologies and processes for the the CISO to consider are: